Linux sothorn202 5.15.0-161-generic #171-Ubuntu SMP Sat Oct 11 08:17:01 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 202.28.82.202 | : 216.73.216.9
pkexec version 0.105
Cant Read [ /etc/named.conf ]
iqtd
RED EYES BYPASS SHELL!
Terminal
Auto Root
Adminer
Backdoor Destroyer
Kernel Exploit
Lock Shell
Lock File
Create User
+ Create Folder
+ Create File
/
home /
wp900 /
QAtest /
wp-content /
plugins /
updraftplus /
[ HOME SHELL ]
NAME
SIZE
PERMISSION
ACTION
central
[ DIR ]
drwxr-xr-x
css
[ DIR ]
drwxr-xr-x
images
[ DIR ]
drwxr-xr-x
includes
[ DIR ]
drwxr-xr-x
js
[ DIR ]
drwxr-xr-x
languages
[ DIR ]
drwxr-xr-x
methods
[ DIR ]
drwxr-xr-x
templates
[ DIR ]
drwxr-xr-x
vendor
[ DIR ]
drwxr-xr-x
SECURITY.md
1.33
KB
-rw-r--r--
admin.php
313.08
KB
-rw-r--r--
backup.php
227.27
KB
-rw-r--r--
changelog-old.txt
124.28
KB
-rw-r--r--
class-updraftplus.php
296.12
KB
-rw-r--r--
example-decrypt.php
1.08
KB
-rw-r--r--
index.html
4.34
KB
-rw-r--r--
options.php
12.31
KB
-rw-r--r--
readme.txt
157.86
KB
-rw-r--r--
restorer.php
237.77
KB
-rw-r--r--
updraftplus.php
15.94
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : SECURITY.md
If you believe that you have found a security issue associated with the current release of this plugin, then please report it to the email address with local part security-reports-only and the domain updraftplus.com. If receipt of the email is not acknowledged within 3 working days, then you can try again and also use the inquiry form on the plugin's website. Do not send emails on any other subject to this address. They will not be acknowledged, regardless of whether they contain pleas to do otherwise; there are inquiry forms and support forums available which are linked within the plugin and easy to find on the plugin website. Please include as much of the information listed below as you can to help us better understand and resolve the issue: * Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.) * Affected version(s) * Impact of the issue, including how an attacker might exploit the issue * Step-by-step instructions to reproduce the issue * The location of the affected code * Full paths of source file(s) related to the manifestation of the issue * Any special configuration required to reproduce the issue * Any log files that are related to this issue (if possible) * Proof-of-concept or exploit code (if possible) This information will help us triage your report more quickly. Thank you!
Close